Showing 401 - 420 results of 498 for search '"homomorphic encryption"', query time: 0.10s Refine Results
  1. 401

    Asynchronous Robust Aggregation Method with Privacy Protection for IoV Federated Learning by Antong Zhou, Ning Jiang, Tong Tang

    Published 2024-01-01
    “…Then, we design a communication-efficient and security enhanced aggregation protocol based on homomorphic encryption, to achieve asynchronous group robust aggregation while protecting data privacy and reducing communication overhead. …”
    Get full text
    Article
  2. 402

    Original : high speed data compression techniques for large scale storage system change to a partially homomorphic database encryption by Phetsouvanh, Silivanxay

    Published 2014
    “…Current design of HELib is implemented using the Brakerski-Gentry-Vaiguntanathan (BGV) homomorphic encryption schema, thus data is guaranteed to be more secure at the server end. …”
    Get full text
    Final Year Project (FYP)
  3. 403

    Towards enhancement of privacy-preserving data mining model for predicting students learning outcomes performance by Abdul Samad, Adlina, Md. Arshad, Marina, Md. Siraj, Maheyzah

    Published 2021
    “…This PPDM combines two privacy preserving approaches which are k-anonymization and homomorphic encryption. On the other hand, for the data mining, classification algorithms such as Random Forest, Support Vector Machine, and Naïve Bayes are compared to find the best accuracy. …”
    Conference or Workshop Item
  4. 404

    The Study of Monotonic Core Functions and Their Use to Build RNS Number Comparators by Mikhail Babenko, Stanislaw J. Piestrak, Nikolay Chervyakov, Maxim Deryabin

    Published 2021-04-01
    “…The potential applications of the new comparator include some recently developed homomorphic encryption algorithms implemented using RNS.…”
    Get full text
    Article
  5. 405

    Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy by Xueyan Liu, Qiong Liu, Jia Wang, Hao Sun

    Published 2024-03-01
    “…By using Paillier homomorphic encryption and an identity-based signature scheme to further prevent differential attacks and achieve multidimensional data aggregation, the safe, efficient, and accurate aggregation processing of ESD is executed. …”
    Get full text
    Article
  6. 406

    Hadoop-based secure storage solution for big data in cloud computing environment by Shaopeng Guan, Conghui Zhang, Yilin Wang, Wenqing Liu

    Published 2024-02-01
    “…Then, we improve the ECC encryption algorithm for the encryption of ordinary data, and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated. …”
    Get full text
    Article
  7. 407

    Bit Incorporated Codon Positional Encoder (BICPE) Algorithm for Privacy Preservation in Vertically Partitioned Data in Cloud by Yogasini Manithurai, Prathibha Badhravati Nagaraju

    Published 2022-09-01
    “…The performance of the proposed technique is compared with the traditional Homomorphic Encryption (HE) in terms of support threshold values (Ts) for different items in a transaction. …”
    Get full text
    Article
  8. 408

    Review of Privacy-Preserving Research in Recommendation Systems by FENG Han, YI Huawei, LI Xiaohui, LI Rui

    Published 2023-08-01
    “…This paper firstly summarizes the privacy-preserving technology, including differential privacy technology, homomorphic encryption technology, federated learning and secure multi-party computing technology, and compares these commonly used privacy-preserving tech-nologies. …”
    Get full text
    Article
  9. 409

    Full Data-Processing Power Load Forecasting Based on Vertical Federated Learning by Zhengxiong Mao, Hui Li, Zuyuan Huang, Yuan Tian, Peng Zhao, Yanan Li

    Published 2023-01-01
    “…Furthermore, we further use RSA encryption in the private set intersection and Paillier homomorphic encryption in the training and inference phases. …”
    Get full text
    Article
  10. 410

    LPCP: An efficient Privacy-Preserving Protocol for Polynomial Calculation Based on CRT by Jiajian Tang, Zhenfu Cao, Jiachen Shen, Xiaolei Dong

    Published 2022-03-01
    “…Our protocol utilizes CRT-based encryption and re-encryption techniques to realize additional and multiplicative homomorphic encryption, which can be transformed into a two-party secure computation scheme. …”
    Get full text
    Article
  11. 411

    A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit by Shuang Yao, Dawei Zhang

    Published 2023-01-01
    “…First, we provide privacy preserving of transaction contents based on homomorphic encryption. It is flexible, as we decouple user identity and transaction contents. …”
    Get full text
    Article
  12. 412

    Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning by Diogo Pereira, Paulo Ricardo Reis, Fábio Borges

    Published 2024-02-01
    “…Furthermore, it obtains a timing performance that does not significantly affect the total training time, unlike protocols that use Homomorphic Encryption.…”
    Get full text
    Article
  13. 413

    TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server by Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

    Published 2022-01-01
    “…Secure computation can be divided into those using homomorphic encryption and secret sharing. The advantage of the former method is that the computation can be performed on a single computing server and the computation process can be made public if the encryption key used is securely managed. …”
    Get full text
    Article
  14. 414

    Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving Techniques by Muhammad Irfan Khalid, Mansoor Ahmed, Markus Helfert, Jungsuk Kim

    Published 2023-12-01
    “…Additionally, we suggest the integration of privacy-enhancing technologies such as secure multi-party computation, homomorphic encryption, and differential privacy with blockchain to accomplish both security and privacy, aligning with the data sharing practices outlined in the General Data Protection Regulation (GDPR) in Europe.…”
    Get full text
    Article
  15. 415

    Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment by Jia Liao, Baihui Jiang, Peng Zhao, Lei Ning, Liming Chen

    Published 2023-09-01
    “…This study further designs and evaluates a TEE-based federated learning model, comparing its resource overhead with other secure aggregation frameworks, like homomorphic encryption (HE) and differential privacy (DP). …”
    Get full text
    Article
  16. 416

    Privacy‐preserving gradient boosting tree: Vertical federated learning for collaborative bearing fault diagnosis by Liqiao Xia, Pai Zheng, Jinjie Li, Wangchujun Tang, Xiangying Zhang

    Published 2022-09-01
    “…Only the model information will be shared under the homomorphic encryption protocol, safeguarding data privacy while retaining high accuracy. …”
    Get full text
    Article
  17. 417

    BURLAP: Bits of Useful Randomness enable Learning with Adjustable Privacy by Reyes, Rene David Reyes

    Published 2023
    “…While cryptography-based approaches such as Fully Homomorphic Encryption (FHE) can be used to provide privacy guarantees that have been rigorously characterized and proven, their adoption comes with two main practical hurdles. …”
    Get full text
    Thesis
  18. 418

    Lattice-based FHE as secure as PKE by Brakerski, Zvika, Vaikuntanathan, Vinod

    Published 2014
    “…We show that (leveled) fully homomorphic encryption (FHE) can be based on the hardness of O(n[superscript 1.5+ε])-approximation for lattice problems (such as GapSVP) under quantum reductions for any ε 〉 0 (or O(n[superscript 2+ε])-approximation under classical reductions). …”
    Get full text
    Get full text
    Article
  19. 419

    A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing by Juyan Li, Zhiqi Qiao, Kejia Zhang, Chen Cui

    Published 2021-01-01
    “…The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. …”
    Get full text
    Article
  20. 420

    Advancements and Challenges in Energy-efficient 6G Mobile Communication Network by Slimani Khadija, Khoulji Samira, Kerkeb Mohamed Larbi

    Published 2023-01-01
    “…Cutting-edge security methods such as homomorphic encryption and blockchain technology may be essential in this regard. …”
    Get full text
    Article